2021
DOI: 10.1007/s11276-021-02549-7
|View full text |Cite
|
Sign up to set email alerts
|

Optimization techniques for spectrum handoff in cognitive radio networks using cluster based cooperative spectrum sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…The proposed Component-Specific CSS Model (CSCSSM) was implemented in MATLAB. The CSCSSM was compared to the Priority-Based Two-Stage Detection Model (PBTSDM) [ 24 ], Spectrum Binary Particle Swarm Optimization and Queuing Model (SpecBPSO-QM) [ 28 ], Optimum Relay Selection and Accurate Cooperative Spectrum Sensing for Hybrid Cognitive Radio Networks (ORS-ACSS) [ 29 ], and Adapt-Then-Combine (ATC) method [ 35 ]. The CSCSSM and the compared methods were analyzed in terms of Network MSD (dB) by varying the time ( i ).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed Component-Specific CSS Model (CSCSSM) was implemented in MATLAB. The CSCSSM was compared to the Priority-Based Two-Stage Detection Model (PBTSDM) [ 24 ], Spectrum Binary Particle Swarm Optimization and Queuing Model (SpecBPSO-QM) [ 28 ], Optimum Relay Selection and Accurate Cooperative Spectrum Sensing for Hybrid Cognitive Radio Networks (ORS-ACSS) [ 29 ], and Adapt-Then-Combine (ATC) method [ 35 ]. The CSCSSM and the compared methods were analyzed in terms of Network MSD (dB) by varying the time ( i ).…”
Section: Resultsmentioning
confidence: 99%
“…In 2021, Devi and Umamaheswari [ 28 ] included the use of the M/G/1 queuing model and the Spectrum Binary Particle Swarm Optimization (Spec BPSO) algorithm for the prediction of an efficient spectrum handoff method. Cluster-based CSS (CBCSS) was employed to increase SU effectiveness and decrease channel congestion.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[13][14][15][16] However, the problem associated with the proactive SH is the obsoletion of the TCS due to the dynamic channel condition that led to the call-dropping and results in poor handoff performance. 12,17,[18][19][20][21] In a pure reactive handoff strategy, this possibility is less as the TCS is prepared by wideband sensing once the handoff triggering event occurs. However, the major drawback of the reactive SH strategy is additional handoff delay that makes it improper for real-time communication.…”
Section: Literature Surveymentioning
confidence: 99%
“…Proactive handoff considerably reduces the handoff delay and the total service time, because instant wideband sensing is not required for this handoff 13–16 . However, the problem associated with the proactive SH is the obsoletion of the TCS due to the dynamic channel condition that led to the call‐dropping and results in poor handoff performance 12,17,18–21 . In a pure reactive handoff strategy, this possibility is less as the TCS is prepared by wideband sensing once the handoff triggering event occurs.…”
Section: Introductionmentioning
confidence: 99%
“…In [17], to detect the malicious user, K Nearest Neighbor K-NN, has been used, where without any knowledge of the malicious user, detection can be made. In [18] & [19], advanced K-NN and Dempster-Shafer (D-S) were implemented to detect malicious SUs in the PU boundary coverage.…”
Section: Literature Surveymentioning
confidence: 99%